GLARE 发表于 2025-3-26 23:39:59
Machine-Checked Proofs for Realizability Checking Algorithms,rithmetic and uninterpreted functions. In that work, we used an SMT solver and an algorithm similar to k-induction to establish the realizability of a contract, and justified our approach via a hand proof. Given the central importance of realizability to our virtual integration approach, we wanted aCorporeal 发表于 2025-3-27 02:11:42
coverage inthis text. Particularly novel features of the book include asystematic treatment of the modelling process in a marine context, theinclusion of diffu978-1-4419-5013-0978-1-4757-4786-7Series ISSN 1387-6961儿童 发表于 2025-3-27 08:24:17
http://reply.papertrans.cn/99/9818/981754/981754_33.pngamyloid 发表于 2025-3-27 10:34:51
Testing the IPC Protocol for a Real-Time Operating System,n system-calls. Inheriting a micro-architecture going back to the L4 kernel, the system calls of the IPC-API are internally structured by atomic actions; according to a security model, these actions can fail and must produce error-codes. Thus, our tests reveal errors in the enforcement of the security model.regale 发表于 2025-3-27 16:31:24
http://reply.papertrans.cn/99/9818/981754/981754_35.pngBanquet 发表于 2025-3-27 20:53:46
http://reply.papertrans.cn/99/9818/981754/981754_36.png极深 发表于 2025-3-27 22:03:20
http://reply.papertrans.cn/99/9818/981754/981754_37.png椭圆 发表于 2025-3-28 02:25:40
Recursive Games for Compositional Program Synthesis,this paper, we present a way to exploit compositionality in the context of ...The goal in our synthesis problem is to instantiate missing expressions in a procedural program so that the resulting program satisfies a safety or termination requirement in spite of an adversarial environment. The probleHeretical 发表于 2025-3-28 10:16:52
Testing the IPC Protocol for a Real-Time Operating System,ce our data-models are complex, the problem is out of reach of conventional model-checking techniques. Our solution is based on symbolic execution implemented inside the interactive theorem proving environment Isabelle/HOL extended by a plugin with test generation facilities called HOL-TestGen..As a追逐 发表于 2025-3-28 10:54:14
Pseudo-Random Number Generator Verification: A Case Study,ng error affecting the information flow in the seeding code of the generator has weakened the security of the cryptographic protocol behind bitcoin transactions..We demonstrate that logic-based verification can be efficiently applied to safeguard against this particular class of vulnerabilities, whi